Access and privacy control enforcement in RFID middleware systems: Proposal and implementation on the fosstrak platform

被引:0
|
作者
Wiem Tounsi
Nora Cuppens-Boulahia
Frédéric Cuppens
Guy Pujolle
机构
[1] Telecom Bretagne,
[2] LIP6/UPMC - University of Paris 6,undefined
来源
World Wide Web | 2016年 / 19卷
关键词
RFID; Access control; Privacy policy; Middleware; EPCglobal; Provisional context;
D O I
暂无
中图分类号
学科分类号
摘要
Radio Frequency IDentification (RFID) technology offers a new way of automating the identification and storing of information in RFID tags. The emerging opportunities for the use of RFID technology in human centric applications like monitoring and indoor guidance systems indicate how important this topic is in term of privacy. Holding privacy issues from the early stages of RFID data collection helps to master the data view before translating it into business events and storing it in databases. An RFID middleware is the entity that sits between tag readers and database applications. It is in charge of collecting, filtering and aggregating the requested events from heterogeneous RFID environments. Thus, the system, at this point, is likely to suffer from parameter manipulation and eavesdropping, raising privacy concerns. In this paper, we propose an access and privacy controller module that adds a security level to the RFID middleware standardized by the EPCglobal consortium. We provide a privacy policy-driven model using some enhanced contextual concepts of the extended Role Based Access Control model, namely the purpose, the accuracy and the consent principles. We also use the provisional context to model security rules whose activation depends on the history of previously performed actions. To show the feasibility of our privacy enforcement model, we first provide a proof-of-concept prototype integrated into the middleware of the Fosstrak platform, then evaluate the performance of the integrated module in terms of execution time.
引用
收藏
页码:41 / 68
页数:27
相关论文
共 50 条
  • [21] Design and implementation of a vehicular access control using RFID.
    Almanza-Ojeda, D. L.
    Hernandez-Gutierrez, A.
    Ibarra-Manzano, M. A.
    MEP 2006: PROCEEDINGS OF MULTICONFERENCE ON ELECTRONICS AND PHOTONICS, 2006, : 223 - +
  • [22] Implementation of RFID-Based Access Control Management System
    Lin, Haiyun
    Wang, Yujiao
    Bi, Jian
    ADVANCED MATERIALS RESEARCH II, PTS 1 AND 2, 2012, 463-464 : 1630 - +
  • [23] Cryptographic Enforcement of Access Control Policies in the Cloud: Implementation and Experimental Assessment
    Berlato, Stefano
    Carbone, Roberto
    Ranise, Silvio
    SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2021, : 370 - 381
  • [24] Implementation of security and privacy in ePassports and the extended access control infrastructure
    Rana, Antonia
    Sportiello, Luigi
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2014, 7 (04) : 233 - 243
  • [25] Secured access control for vehicles in RFID systems on roads
    Yanfei Lu
    Xin Li
    Xing Wei
    Tao Jing
    Wei Cheng
    Yan Huo
    Personal and Ubiquitous Computing, 2014, 18 : 1893 - 1900
  • [26] Secured access control for vehicles in RFID systems on roads
    Lu, Yanfei
    Li, Xin
    Wei, Xing
    Jing, Tao
    Cheng, Wei
    Huo, Yan
    PERSONAL AND UBIQUITOUS COMPUTING, 2014, 18 (08) : 1893 - 1900
  • [27] Sieve: A Middleware Approach to Scalable Access Control for Database Management Systems
    Pappachan, Primal
    Yus, Roberto
    Mehrotra, Sharad
    Freytag, Johann-Christoph
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2020, 13 (11): : 2424 - 2437
  • [28] Privacy and Access Control for IHE-Based Systems
    Katt, Base
    Breu, Ruth
    Hafner, Micahel
    Schabetsberger, Thomas
    Mair, Richard
    Wozak, Florian
    ELECTRONIC HEALTHCARE, 2009, 1 : 145 - +
  • [29] Separating access control policy, enforcement, and functionality in extensible systems
    Grimm, R
    Bershad, BN
    ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2001, 19 (01): : 36 - 70
  • [30] Modern Physical Access Control Systems and Privacy Protection
    Dzurenda, Petr
    Hajny, Jan
    Zeman, Vaclav
    Vrba, Kamil
    2015 38TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2015, : 1 - 5